Computer Science ›› 2009, Vol. 36 ›› Issue (6): 75-77.

Previous Articles     Next Articles

YAN De-qin ZHAO Hong-bo JIN Hong (Department of Computer Seienee,Liaoning Normal University,Dalian 116029,China)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: In the (t, n) threshold multi-secret sharing scheme, there are n participants in the system. At least t or more participants can easily pool their secrets shadows and reconstruct m secrets at the same time. He-Dawson proposed a multistage secret sharing b

Key words: Cryptosystem, Secret sharing, Multi-secret sharing, Threshold scheme

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!